All about the topic

OpenStack

Last post

Full control with rate limits for our Managed AI models

Full control with rate limits for our Managed AI models

With our managed AI models, we at NETWAYS Web Services offer you various AI models for privacy-compliant use. Depending on your use case, you can use general models, embedding or reranking models in your applications via standardized APIs. The use of AI models via the API entails variable resource consumption - depending on how and for what the models are used. To give you more planning and financial security and control, we have introduced new options for controlling token throughput in...

read more

All contributions

Cloud Deployment in 15 Minutes with Terraform and Docker

Cloud Deployment in 15 Minutes with Terraform and Docker

In today's world of the cloud, it's easy to lose track: VMs, Kubernetes, Serverless, the possibilities are almost endless, and the "best" way to run applications is not always clear. It is often worth creating a proof of concept and going through a cloud deployment...

Interview series: Interview with Achim Ledermüller

Interview series: Interview with Achim Ledermüller

Every story begins with people who make a difference. In our interview series, it is precisely these people who have their say: NWS employees who share their experiences, ideas and insights with us. We want to know what drives them and what we can all learn from them....

Review: OpenInfra Summit 2025

Review: OpenInfra Summit 2025

The OpenInfra Summit 2025 was once again held in Europe last month. Just outside Paris, developers, operators and decision-makers from all corners of the world came together to discuss the latest developments in cloud-native infrastructure, edge computing and...

Checklist: Security for your cloud infrastructure

Checklist: Security for your cloud infrastructure

Your cloud infrastructure can be made secure with a clear strategy and continuous measures. With our checklist, you can keep an eye on all important security aspects. Secure access and authentication Implement strong password policies: Complex, unique passwords and...

Advantages of professional cloud migration

Advantages of professional cloud migration

Today, companies of all sizes are faced with the challenge of remaining competitive, optimizing their costs and being innovative at the same time. Cloud migration, i.e. the relocation of IT systems, applications and data from local servers to the cloud, plays a key...

Avoid typical mistakes during cloud migration

Avoid typical mistakes during cloud migration

For many companies, migrating to the cloud is a strategically important step. It promises flexibility, scalability, cost efficiency and access to the latest technology. But as tempting as the advantages are: Getting there is not a sure-fire success. Time and again,...

What is cloud computing?

What is cloud computing?

Definition With cloud computing, IT resources are provided via the internet. Instead of operating your own servers, storage or software within the company, these services are outsourced to a cloud provider. As a rule, only what is actually used is billed. This makes...

IPv6 Support @NETWAYS

IPv6 Support @NETWAYS

The time has finally come: IPv6 is now fully usable in the NETWAYS Cloud! Many have already asked for it, others have feared it - but one thing is clear: IPv6 is the future. It is therefore all the more important to give our customers the opportunity to use it. Some...

VM rescue on OpenStack

VM rescue on OpenStack

Accidentally terminated the SSH service, deleted the boot partition, or complications after updating the operating system? Most of us have stood in front of an inaccessible, misconfigured or otherwise broken server at some point and no longer had access. Fortunately,...

New cloud server models: performance and dedicated

New cloud server models: performance and dedicated

We are expanding our cloud server portfolio for optimal and consistent performance of the most demanding applications. Two new additional model series are now available as cloud servers or Kubernetes nodes. "p" model (performance): These new cloud servers with vCPUs...

Talos Linux on OpenStack: step by step

Talos Linux on OpenStack: step by step

Choosing the right platform for running Kubernetes workloads is an important strategic decision. Managed Kubernetes services offer a quick and easy way to deploy and manage Kubernetes clusters, but they often come with limitations in terms of flexibility and...

LUKS encrypted storage on OpenStack

LUKS encrypted storage on OpenStack

Conscientiously securing your IT landscape has become increasingly important in recent years. With a steady increase in (user) data that needs to be managed, processed and stored, encrypting this data should be on your agenda for a holistically secured IT...

Migration of servers on VMware to OpenStack

Migration of servers on VMware to OpenStack

In this tutorial we look at migrating servers on VMware to OpenStack. Following the recent acquisition of VMware by Broadcom, many smaller Cloud Service Providers (CSPs) have received notices to terminate their membership in VMWare's partner program in recent weeks....

Terraform and OpenStack

Terraform and OpenStack

Many of you are probably already familiar with the use of Terraform in combination with Azure or AWS. And although these are the most commonly used platforms, there are uncertainties - often with regard to data protection (GDPR) - and therefore still a need for...

Scaling on demand

Scaling on demand

Depending on the type of in-house production, it may be worthwhile for some server operators to automatically create virtual machines for a certain period of time using a script and - once the work is done - to delete them again just as automatically; for example, if...

Manage and assign security groups

Manage and assign security groups

Once you have clicked on the first new instance in our cloud web interface and assigned an SSH public key with which you want to connect to this VM, you are faced with the small problem that you cannot access the instance from outside; we have the "default" security...